Start Level 1 Node: SAP NetWeaver Process Integration Security GuideSAP NetWeaver Process Integration Security GuideEnd Level 1 Node: SAP NetWeaver Process Integration Security Guide
   Start Level 1 Node: Before You StartBefore You StartEnd Level 1 Node: Before You Start
   Start Level 1 Node: Technical System LandscapeTechnical System LandscapeEnd Level 1 Node: Technical System Landscape
   Start Level 1 Node: CommunicationCommunicationEnd Level 1 Node: Communication
      Start Level 2 Node: Technical CommunicationTechnical CommunicationEnd Level 2 Node: Technical Communication
      Start Level 2 Node: Business CommunicationBusiness CommunicationEnd Level 2 Node: Business Communication
      Start Level 2 Node: Communication DestinationsCommunication DestinationsEnd Level 2 Node: Communication Destinations
      Start Level 2 Node: Message-Level SecurityMessage-Level SecurityEnd Level 2 Node: Message-Level Security
         Start Level 3 Node: Certificate StoreCertificate StoreEnd Level 3 Node: Certificate Store
         Start Level 3 Node: Archiving Secured MessagesArchiving Secured MessagesEnd Level 3 Node: Archiving Secured Messages
      Start Level 2 Node: Network and Transport Layer SecurityNetwork and Transport Layer SecurityEnd Level 2 Node: Network and Transport Layer Security
         Start Level 3 Node: HTTP and SSLHTTP and SSLEnd Level 3 Node: HTTP and SSL
         Start Level 3 Node: RFC and SNCRFC and SNCEnd Level 3 Node: RFC and SNC
         Start Level 3 Node: FTP and FTPSFTP and FTPSEnd Level 3 Node: FTP and FTPS
         Start Level 3 Node: Communication PortsCommunication PortsEnd Level 3 Node: Communication Ports
         Start Level 3 Node: Network ZonesNetwork ZonesEnd Level 3 Node: Network Zones
      Start Level 2 Node: Adapter-Specific Security SettingsAdapter-Specific Security SettingsEnd Level 2 Node: Adapter-Specific Security Settings
         Start Level 3 Node: Adapters Running on the Integration EngineAdapters Running on the Integration EngineEnd Level 3 Node: Adapters Running on the Integration Engine
         Start Level 3 Node: Adapters Running on the Advanced Adapter EngineAdapters Running on the Advanced Adapter EngineEnd Level 3 Node: Adapters Running on the Advanced Adapter Engine
            Start Level 4 Node: IDoc Adapter (AAE)IDoc Adapter (AAE)End Level 4 Node: IDoc Adapter (AAE)
            Start Level 4 Node: RFC AdapterRFC AdapterEnd Level 4 Node: RFC Adapter
            Start Level 4 Node: SOAP AdapterSOAP AdapterEnd Level 4 Node: SOAP Adapter
            Start Level 4 Node: SAP Business Connector AdapterSAP Business Connector AdapterEnd Level 4 Node: SAP Business Connector Adapter
            Start Level 4 Node: Marketplace AdapterMarketplace AdapterEnd Level 4 Node: Marketplace Adapter
            Start Level 4 Node: RosettaNet RNIF AdaptersRosettaNet RNIF AdaptersEnd Level 4 Node: RosettaNet RNIF Adapters
            Start Level 4 Node: CIDX AdapterCIDX AdapterEnd Level 4 Node: CIDX Adapter
            Start Level 4 Node: File/FTP, JDBC, JMS, and Mail AdaptersFile/FTP, JDBC, JMS, and Mail AdaptersEnd Level 4 Node: File/FTP, JDBC, JMS, and Mail Adapters
            Start Level 4 Node: HTTP Adapter (AAE)HTTP Adapter (AAE)End Level 4 Node: HTTP Adapter (AAE)
         Start Level 3 Node: Adapters Running on the Adapter Engine (Java SE)Adapters Running on the Adapter Engine (Java SE)End Level 3 Node: Adapters Running on the Adapter Engine (Java SE)
   Start Level 1 Node: User Management and Authorization ConceptsUser Management and Authorization ConceptsEnd Level 1 Node: User Management and Authorization Concepts
      Start Level 2 Node: User Management for SAP NetWeaver PI Standard Installation (PI)User Management for SAP NetWeaver PI Standard Installation (PI)End Level 2 Node: User Management for SAP NetWeaver PI Standard Installation (PI)
      Start Level 2 Node: User Management for Non-Central AAE (PI-AE )User Management for Non-Central AAE (PI-AE )End Level 2 Node: User Management for Non-Central AAE (PI-AE )
      Start Level 2 Node: User Management for the AEX (PI-AEX)User Management for the AEX (PI-AEX)End Level 2 Node: User Management for the AEX (PI-AEX)
      Start Level 2 Node: User Management for SAP Partner Connectivity Kit (PI-PCK)User Management for SAP Partner Connectivity Kit (PI-PCK)End Level 2 Node: User Management for SAP Partner Connectivity Kit (PI-PCK)
      Start Level 2 Node: Standard Users (Dual-Stack)Standard Users (Dual-Stack)End Level 2 Node: Standard Users (Dual-Stack)
         Start Level 3 Node: User StoreUser StoreEnd Level 3 Node: User Store
         Start Level 3 Node: Changing Service UserChanging Service UserEnd Level 3 Node: Changing Service User
         Start Level 3 Node: Service User for Internal CommunicationService User for Internal CommunicationEnd Level 3 Node: Service User for Internal Communication
         Start Level 3 Node: Service User for Message ExchangeService User for Message ExchangeEnd Level 3 Node: Service User for Message Exchange
      Start Level 2 Node: Standard Users (AEX)Standard Users (AEX)End Level 2 Node: Standard Users (AEX)
      Start Level 2 Node: User TypesUser TypesEnd Level 2 Node: User Types
      Start Level 2 Node: Roles (AS ABAP)Roles (AS ABAP)End Level 2 Node: Roles (AS ABAP)
         Start Level 3 Node: Integration into Single Sign-On EnvironmentsIntegration into Single Sign-On EnvironmentsEnd Level 3 Node: Integration into Single Sign-On Environments
         Start Level 3 Node: Roles for Cross-Component Business Process ManagementRoles for Cross-Component Business Process ManagementEnd Level 3 Node: Roles for Cross-Component Business Process Management
      Start Level 2 Node: UME Roles and Actions (AS Java)UME Roles and Actions (AS Java)End Level 2 Node: UME Roles and Actions (AS Java)
         Start Level 3 Node: Special ActionsSpecial ActionsEnd Level 3 Node: Special Actions
         Start Level 3 Node: Roles for Secure Usage of the Integration Directory Programming InterfaceRoles for Secure Usage of the Integration Directory Programming InterfaceEnd Level 3 Node: Roles for Secure Usage of the Integration Directory Programming Interface
      Start Level 2 Node: Role-Based Authorizations in ES Repository and Integration DirectoryRole-Based Authorizations in ES Repository and Integration DirectoryEnd Level 2 Node: Role-Based Authorizations in ES Repository and Integration Directory
      Start Level 2 Node: ACL-Based AuthorizationsACL-Based AuthorizationsEnd Level 2 Node: ACL-Based Authorizations
         Start Level 3 Node: ACL-Based Authorizations in ES Repository and Integration DirectoryACL-Based Authorizations in ES Repository and Integration DirectoryEnd Level 3 Node: ACL-Based Authorizations in ES Repository and Integration Directory
         Start Level 3 Node: ACL-Based Authorizations for Service UsersACL-Based Authorizations for Service UsersEnd Level 3 Node: ACL-Based Authorizations for Service Users
   Start Level 1 Node: Security Concepts for B2B CommunicationSecurity Concepts for B2B CommunicationEnd Level 1 Node: Security Concepts for B2B Communication
   Start Level 1 Node: Further Security-Related TopicsFurther Security-Related TopicsEnd Level 1 Node: Further Security-Related Topics
      Start Level 2 Node: Protection of Sensitive Message DataProtection of Sensitive Message DataEnd Level 2 Node: Protection of Sensitive Message Data
         Start Level 3 Node: Potential Visibility of Sensitive Message DataPotential Visibility of Sensitive Message DataEnd Level 3 Node: Potential Visibility of Sensitive Message Data
         Start Level 3 Node: Messaging Components of the Integration EngineMessaging Components of the Integration EngineEnd Level 3 Node: Messaging Components of the Integration Engine
         Start Level 3 Node: Java-Based Messaging ComponentsJava-Based Messaging ComponentsEnd Level 3 Node: Java-Based Messaging Components
      Start Level 2 Node: AuditingAuditingEnd Level 2 Node: Auditing